{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:39:38Z","timestamp":1729676378169,"version":"3.28.0"},"reference-count":75,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1109\/hicss.2013.407","type":"proceedings-article","created":{"date-parts":[[2013,3,21]],"date-time":"2013-03-21T16:23:07Z","timestamp":1363882987000},"page":"325-334","source":"Crossref","is-referenced-by-count":0,"title":["Mitigating Threats to Collaboration and CMC: Identifying Antecedents of Online Deviance"],"prefix":"10.1109","author":[{"given":"Jeffrey Gainer","family":"Proudfoot","sequence":"first","affiliation":[]},{"given":"Randall J.","family":"Boyle","sequence":"additional","affiliation":[]},{"given":"Jeffrey A.","family":"Clements","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","doi-asserted-by":"publisher","DOI":"10.1002\/1099-0798(200010)18:5<567::AID-BSL410>3.0.CO;2-8"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1300\/J151v03n04_05"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1080\/01638530701739181"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.2466\/PR0.85.5.271-281"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.39.10.1123"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcps.2009.09.003"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1007\/BF02291817"},{"key":"43","article-title":"Flaming' in computer-mediated communication: Observations, explanations, implications","author":"lea","year":"1992","journal-title":"Contexts of Computer-mediated Communication"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1016\/S1077-7229(05)80004-5"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.27"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1089\/109493199316311"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.1177\/009365096023001001"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1007\/BF00383238"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.1016\/S0191-8869(00)00064-7"},{"key":"68","doi-asserted-by":"publisher","DOI":"10.1037\/\/0022-3514.60.6.927"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1089\/109493104322820101"},{"journal-title":"A Theory of Cognitive Dissonance","year":"1957","author":"festinger","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1177\/0013164493053002011"},{"key":"25","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1080\/07421222.1998.11518216","article-title":"An assessment of group support systems experimental research: Methodology and results","volume":"15","author":"fjermestad","year":"1998","journal-title":"Journal of Management Information Systems"},{"key":"26","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1080\/07421222.2000.11045657","article-title":"Group support systems: A descriptive evaluation of case and field studies","volume":"17","author":"fjermestad","year":"2000","journal-title":"Journal of Management Information Systems"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1287\/isre.10.3.233"},{"key":"28","first-page":"1","article-title":"Structural equation modeling and regression: Guidelines for research practice","volume":"1","author":"gefen","year":"2001","journal-title":"Communications of AIS"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.4018\/jec.2005100102"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.2001.2961"},{"journal-title":"Diagnostic and Statistical Manual of Mental Disorders (Revised 4th Ed","year":"2000","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-005-1902-9"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.03.017"},{"journal-title":"Sociology (4th Ed )","year":"2001","author":"giddens","key":"30"},{"key":"6","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1080\/07421222.2003.11045743","article-title":"Collaboration engineering with ThinkLets to pursue sustained success with group support systems","volume":"19","author":"briggs","year":"2003","journal-title":"Journal of Management Information Systems"},{"journal-title":"Predicting Deceptive Behavior Exploring Antecedents to Deceptive Behaviors","year":"2012","author":"boyle","key":"5"},{"key":"32","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1177\/a017405","article-title":"Virtual criminality: Old wine in new bottles?","volume":"10","author":"grabosky","year":"2001","journal-title":"Social & Legal Studies"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1176\/appi.ajp.2007.07101556"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.2307\/1252012"},{"key":"70","doi-asserted-by":"publisher","DOI":"10.1080\/13600860054935"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.1037\/2152-0828.1.S.13"},{"journal-title":"Studies in Machiavellianism","year":"1970","author":"christie","key":"9"},{"key":"72","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402979"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1023\/B:GRUP.0000011942.31158.d8"},{"key":"73","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.1998.1.237"},{"key":"74","doi-asserted-by":"publisher","DOI":"10.1023\/B:GRUP.0000011944.62889.6f"},{"key":"75","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1080\/07421222.2004.11045779","article-title":"A comparison of classification methods for predicting deception in computer-mediated communication","volume":"20","author":"zhou","year":"2004","journal-title":"Journal of Management Information Systems"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(86)90050-6"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.2165\/00023210-200822050-00001"},{"key":"57","first-page":"2","article-title":"The insider threat to information systems: The psychology of the dangerous insider","author":"shaw","year":"1998","journal-title":"Security Awareness Bulletin"},{"key":"56","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1177\/0894439307313515","article-title":"A safe haven for misbehaving?","volume":"26","author":"selwyn","year":"2008","journal-title":"Social Science Computer Review"},{"key":"19","doi-asserted-by":"crossref","first-page":"575","DOI":"10.2307\/25148857","article-title":"Media, tasks, and communication processes: A theory of media synchronicity","volume":"32","author":"dennis","year":"2008","journal-title":"MIS Quarterly"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1080\/01639620600605333"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1177\/0894439304271541"},{"key":"18","first-page":"278","article-title":"A metaanalysis of effectiveness, efficiency, and participant satisfaction in group support systems research","author":"dennis","year":"1996","journal-title":"Proceedings of the Seventeenth International Conference on Information Systems"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(00)00041-8"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2004.tb00293.x"},{"journal-title":"An Exploration of Middle and High School Students' Perceptions of Deviant Behavior When Using Computers and the Internet","year":"2001","author":"daniel","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9280.1993.tb00580.x"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.37.2.125"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1037\/h0047358"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/0273-2297(91)90013-E"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(99)80135-7"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1177\/1469787404043815"},{"key":"65","doi-asserted-by":"publisher","DOI":"10.1016\/j.cpr.2010.03.007"},{"key":"62","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1023\/A:1020392231924","article-title":"Identity management in cyberspace","volume":"4","author":"suler","year":"2002","journal-title":"Journal of Applied Psychoanalytic Studies"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1111\/j.1399-5618.2004.00110.x"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1002\/1097-4679(197204)28:2<191::AID-JCLP2270280220>3.0.CO;2-G"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.2307\/248922"},{"journal-title":"National Conference of State Legislature","year":"2012","key":"49"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2.3.192"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.159"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1007\/s10611-008-9111-y"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1176\/appi.ajp.158.11.1783"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1037\/\/0033-2909.103.3.391"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.biopsych.2005.11.007"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4679(199701)53:1<73::AID-JCLP10>3.3.CO;2-O"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2004.7.553"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1002\/1097-4679(199511)51:6<768::AID-JCLP2270510607>3.0.CO;2-1"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1007\/BF00705579"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2001.926241"}],"event":{"name":"2013 46th Hawaii International Conference on System Sciences (HICSS)","start":{"date-parts":[[2013,1,7]]},"location":"Wailea, HI, USA","end":{"date-parts":[[2013,1,10]]}},"container-title":["2013 46th Hawaii International Conference on System Sciences"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6479598\/6479821\/06479873.pdf?arnumber=6479873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,11]],"date-time":"2019-07-11T02:24:45Z","timestamp":1562811885000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6479873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":75,"URL":"https:\/\/doi.org\/10.1109\/hicss.2013.407","relation":{},"subject":[],"published":{"date-parts":[[2013,1]]}}}